The following Denial of Service Flaw was reported in Samba 3.0 versions prior to and including v3.0.6:
- (i) A DoS bug in smbd may allow an
unauthenticated user to cause smbd to
spawn new processes each one entering
an infinite loop. After sending a sufficient
amount of packets it is possible to exhaust
the memory resources on the server.
- (ii) A DoS bug in nmbd may allow an attacker
to remotely crash the nmbd daemon.
For full details please see the security patch announcement. The patch file for Samba 3.0.5 addressing both bugs (samba-3.0.5-DoS.patch) can be downloaded here.